Webserver security

→ Installation of mod_security with our own custom ruleset. This module consists of many different rules.
→ The ruleset that we use blocks dangerous attempts to hack the server. Add an additional rule or disabling one is possible for us whenever needed as it consists of many rules.
→ Compiled PHP version 4, 5 or 6 as per the requirements of the client.
→ Installation of mod_evasive to prevent DDoS Attacks.
→ PHP Security (disabling few php functions which can be used for php backdoor: "exec,system, passthru, readfile,shell_exec, escapeshellarg, escapeshellcmd, proc_close, proc_open, ini_alter ,dl, popen,parse_ini_file, show_source,curl_exec")
→ PHP as SUPHP.
→ open_basedir and mod_userdir restriction.

Firewall configuration

→ Installing CSF/APF firewall (latest version) and configuring the firewall to accept only incoming/outgoing connections on ports that are needed on a cPanel system.
→ Disabling port 22 (default SSH port).
→ Brute Force Detection setup and configuration with the firewall.
→ Linux socket monitor setup - This will send you an alert whenever a new port is opened on the server.

Securing Binaries

→ Installing/updating Libsafe.
→ DNS recursion restriction

Security Audit

→ Installation of Rootkithunter and configuring it to update and run itself on a daily basis - It will then send you a report if anything goes wrong.
→ Repair or Re-installation of corrupt binaries.

Server Monitoring

→ Installing System Integrity Monitor to monitor the following services
- Apache
- MySQL
- Email
- Server load
- SSH
- FTP
→ The System will automatically try to fix any problems which may arise such as big log files that would automatically get recycled. If the system is not able to fix the problem itself it will send a notification to our support department.

Apache Tweaking

File Reansfer (From Server to Server)

Changing server ? Huge data ? No worries. We can handel your task.We will use rsync so that your data may not get corrupted.
→ Please use contact us for price.

SSH Security

→ Installing and compiling the latest version of OpenSSL.
→ Installing and compiling the latest version of OpenSSH and configuring it with the latest version of OpenSSL.
→ Disabling Root access and enabling key based access as per the client request.
→ Changing default SSH port, disabling SSH1 protocol and enabling SSH 2 protocol.

Environmental security

→ Mounting /tmp partition with noexec permissions so that no files on these partitions can be executed.
→ Disabling compilers for all users but root.
→ Sysctl.conf hardening to make it much harder to get attacked by syn floods.
→ Open basedir protection setup.
→ Installing chkrootkit and configuring it to send daily report to our support department.
→ Disabling Ftp access for the default cPanel users.
→ Password Policy - Password utilizing at least 8 characters including alphanumeric and grammatical symbols is recommended.
→ Installing & Configuring Malware Detect Software and ClamV Scanner.
→ Realtime FTP scanner applicable for pure FTP.